Confidential Computing across Edge-to-Cloud for Machine Learning: A Survey Study Authors: SM Zobaed, Mohsen Amini Salehi | Published: 2023-07-31 TEE ImplementationSoftware SecurityData Management System 2023.07.31 2025.05.28 Literature Database
Machine Learning with Confidential Computing: A Systematization of Knowledge Authors: Fan Mo, Zahra Tarkhani, Hamed Haddadi | Published: 2022-08-22 | Updated: 2024-06-03 TEE ImplementationData Protection MethodMembership Inference 2022.08.22 2025.05.28 Literature Database
A Comprehensive Benchmark Suite for Intel SGX Authors: Sandeep Kumar, Abhisek Panda, Smruti R. Sarangi | Published: 2022-05-13 TEE ImplementationData GenerationPerformance Evaluation 2022.05.13 2025.05.28 Literature Database
ShadowNet: A Secure and Efficient On-device Model Inference System for Convolutional Neural Networks Authors: Zhichuang Sun, Ruimin Sun, Changming Liu, Amrita Roy Chowdhury, Long Lu, Somesh Jha | Published: 2020-11-11 | Updated: 2023-07-06 TEE ImplementationWatermarkingModel Performance Evaluation 2020.11.11 2025.05.28 Literature Database
CURE: A Security Architecture with CUstomizable and Resilient Enclaves Authors: Raad Bahmani, Ferdinand Brasser, Ghada Dessouky, Patrick Jauernig, Matthias Klimmek, Ahmad-Reza Sadeghi, Emmanuel Stapf | Published: 2020-10-29 TEE ImplementationAccess ControlMemory Layout Design 2020.10.29 2025.05.28 Literature Database
Performance Analysis of Scientific Computing Workloads on Trusted Execution Environments Authors: Ayaz Akram, Anna Giannakou, Venkatesh Akella, Jason Lowe-Power, Sean Peisert | Published: 2020-10-25 TEE ImplementationWatermarkingFactors of Performance Degradation 2020.10.25 2025.05.28 Literature Database
GOAT: GPU Outsourcing of Deep Learning Training With Asynchronous Probabilistic Integrity Verification Inside Trusted Execution Environment Authors: Aref Asvadishirehjini, Murat Kantarcioglu, Bradley Malin | Published: 2020-10-17 TEE ImplementationPoisoningAttack Method 2020.10.17 2025.05.28 Literature Database
DarkneTZ: Towards Model Privacy at the Edge using Trusted Execution Environments Authors: Fan Mo, Ali Shahin Shamsabadi, Kleomenis Katevas, Soteris Demetriou, Ilias Leontiadis, Andrea Cavallaro, Hamed Haddadi | Published: 2020-04-12 TEE ImplementationPrivacy IssuesComputational Efficiency 2020.04.12 2025.05.28 Literature Database